ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

221 results

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

670 views

2 years ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,368 views

6 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,438 views

10 years ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,230 views

2 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...

43:09
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

3,850 views

10 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,286 views

12 years ago

DEFCONConference
DEF CON 31 - StackMoonwalk  - Alessandro Magnosi, Arash  Parsa, Athanasios Tserpelis

The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...

39:41
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis

1,540 views

2 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,092 views

10 years ago

DEFCONConference
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.

40:06
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

7,440 views

6 years ago

DEFCONConference
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov

To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...

48:11
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov

1,817 views

2 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,053 views

9 years ago

DEFCONConference
Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 Conference

His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented ...

48:49
Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 Conference

5,590 views

6 years ago

DEFCONConference
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...

47:07
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

6,176 views

10 years ago

Channel2600
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...

51:13
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

70 views

1 year ago

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

303 views

2 weeks ago

DEFCONConference
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

1,436 views

9 years ago

DEFCONConference
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...

39:19
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

39,645 views

3 years ago

DEFCONConference
DEF CON 29 - David Dworken - Worming through IDEs

You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...

22:49
DEF CON 29 - David Dworken - Worming through IDEs

2,159 views

4 years ago

Samuel Henrique
The Security of Debian - An introduction to advanced users  - DebConf25

How Debian handles security vulnerabilities (CVEs) for its packages. Learn how security vulnerabilities are tracked and fixed, ...

43:52
The Security of Debian - An introduction to advanced users - DebConf25

646 views

2 months ago